IT SECURITY IT Security Systems AGENCY

advertisement
AGENCY IT SECURITY HANDBOOK
OPERATION CONTROLS
IT Security Systems
Version 2.0
November 2001
Operational Controls
IT Security Handbook
TABLE OF CONTENTS
1. PERSONNEL/USER SECURITY ............................................................................................. 4
1.1.
PURPOSE AND SCOPE .................................................................................................................................... 4
1.2.
BACKGROUND ................................................................................................................................................ 4
1.3.
POLICY .............................................................................................................................................................. 4
1.4.
RESPONSIBILITIES ......................................................................................................................................... 8
2. INCIDENT REPORTING.......................................................................................................... 9
2.1.
PURPOSE AND SCOPE .................................................................................................................................... 9
2.2.
BACKGROUND ................................................................................................................................................ 9
2.3.
POLICY/PROCESS ........................................................................................................................................... 9
2.4.
RESPONSIBILITIES ....................................................................................................................................... 12
3. EDUCATION, TRAINING AND AWARENESS .................................................................. 14
3.1.
PURPOSE AND SCOPE .................................................................................................................................. 14
3.2.
BACKGROUND .............................................................................................................................................. 14
3.3.
POLICY ............................................................................................................................................................ 14
3.4.
RESPONSIBILITIES ....................................................................................................................................... 16
4. SECURITY CONSIDERATIONS IN COMPUTER SUPPORT OPERATIONS .............. 18
4.1.
PURPOSE......................................................................................................................................................... 18
4.1
BACKGROUND .............................................................................................................................................. 18
4.2.
POLICY ............................................................................................................................................................ 18
4.3.
RESPONSIBILITIES ....................................................................................................................................... 23
5. PHYSICAL/ENVIRONMENTAL SECURITY ..................................................................... 24
5.1.
PURPOSE AND SCOPE .................................................................................................................................. 24
5.2.
BACKGROUND .............................................................................................................................................. 24
5.3.
POLICY ............................................................................................................................................................ 24
5.4.
RESPONSIBILITIES ....................................................................................................................................... 26
6. CONTRACTOR/VENDOR/PARTNER SECURITY ........................................................... 27
6.1
PURPOSE......................................................................................................................................................... 27
6.1.
BACKGROUND .............................................................................................................................................. 27
6.2.
POLICY ............................................................................................................................................................ 27
6.3.
RESPONSIBILITIES ....................................................................................................................................... 29
7. APPENDIX A ............................................................................................................................ 31
7.1.
ACRONYMS ................................................................................................................................................... 31
8. APPENDIX B........................................................................................................................... 32
8.1.
GLOSSARY ..................................................................................................................................................... 32
2
Operational Controls
IT Security Handbook
9. APPENDIX C ........................................................................................................................... 39
9.1.
REFERENCES ................................................................................................................................................. 39
3
Operational Controls
IT Security Handbook
1. PERSONNEL/USER SECURITY
1.1. PURPOSE AND SCOPE
1.1.1.
This chapter provides policy and guidance on implementing minimum requirements
concerning the staffing of positions that interact with all Information Technology (IT)
System resources; the administration of users on a system, including considerations for
terminating user access; and special considerations that may arise when contractors or other
non-agency individuals have access to the Agency IT System resources.
1.1.2.
The policy contained in this chapter is mandatory for all organizational units, employees,
contractors, and others having access to and/or using the IT System resources of the Agency.
1.2. BACKGROUND
1.2.1.
Many important issues in computer security involve users, designers, implementers, and
managers. A broad range of security issues relates to how these individuals interact with
computers and the access and authorities they need to do their job. No IT System can be
secured without properly addressing these security issues.
1.2.2.
OMB Circular A-130, Appendix III requires that each system establish a set of “Rules of
Behavior”. The security required by the rules is only as stringent as necessary to provide
adequate security for the system and the information it contains.
1.3. POLICY
1.3.1.
Staffing. The Agency’s facility staffing process involves, at a minimum, the following steps
which apply equally to all users of the Agency’s IT System resources:
1.3.1.1.
Position definition. Identify and address security issues early in the process of
defining a position. Once a position has been broadly defined, the responsible
supervisor determines the type of computer access needed for the position. There are
two general security rules to apply when granting access:

Separation of duties. NOTE: This phrase refers to dividing roles and
responsibilities so that a single individual cannot subvert a critical function. For
example, in financial systems, no single individual shall normally be given authority
to issue checks. Rather, one person initiates a request for a payment and another
authorizes that same payment.

Least privilege. NOTE: This phrase refers to the security objective of granting
users only those accesses they need to perform their official duties.
1.3.1.2.
Determining position sensitivity:

Supervisors, with assistance from the ISO and Human Resources Management
analyze all positions, establish their sensitivity level designation, and document them
with a Position Sensitivity Level Designation.

The Office Head, or designee (e.g., Director, Human Resources Management), signs
the appropriate form.
1.3.1.3.
The following positions will be designated no lower than moderate risk:
4
Operational Controls
IT Security Handbook

Office and unit ISO(s) and alternates

N and NH staff (excluding clerical positions)

Individuals having either programmer privileges or the ability to create and add users
and/or menus to establish file access for IT System resources that process sensitive
data
1.3.1.4.
Position descriptions must be written or annotated to reflect specific security
responsibilities and position sensitivity levels. Within this context, “specific security
responsibilities” refer to employee obligations to protect sensitive data and to use such
data and information derived from it only in the execution of official duties.
1.3.1.5.
All other individuals with IT System resource access (e.g., contractors, volunteers)
must meet the requirements of government employees performing similar duties.
1.3.1.6.
Screening – Background screening helps determine whether a particular individual is
suitable for a given position.

The appropriate investigation will be requested by the office to ensure the screening
of all individuals (including non-the Agency individuals, (e.g. contractors,
volunteers, work-studies) before they are granted access to sensitive data or are
allowed to participate in the design, operation or maintenance of sensitive
information systems.

The level of screening required varies from minimal checks to a full background
investigation depending on the sensitivity of the information to be handled or the risk
and magnitude of loss or harm that could be caused by the position.

It is more effective to use separation of duties and least privilege to limit the
sensitivity of the position, rather than relying on screening to reduce the risk to the
organization.

The Emergency Preparedness and Administration Security Office has issued a
“Security and Risk Designation, Appendix A”, that establishes guidelines with regard
to position sensitivity designation, risk levels and corresponding security
investigation requirements.
1.3.1.7.
1.3.2.
Employee Training and Awareness

Employees will be trained in the computer security responsibilities and duties
associated with their jobs.

For more training requirements, see Operations Handbook Chapter 3. “Education,
Training, and Awareness”.
User Administration. The Agency facilities must ensure effective administration of users’
computer access to maintain system security, including user account management, auditing
and the timely modification or removal of access.
1.3.2.1.
User Account Management

The Agency office management designates and records individuals authorized to
issue access to IT System resources and data.

The Agency Management, or their designee(s), sponsors user access for all users,
including non Agency users and recommends access by the CIO. A written and
signed request (electronic or paper form) for user access by management, or
designee(s), constitutes management approval to initiate a request for access to any
5
Operational Controls
IT Security Handbook
sensitive IT System resource. Management ensures that such requests meet the
following criteria:

The request contains name, organization (or name of contracting company
and contract number if applicable), location, purpose for access, and access
requirements.

The individual must have an Agency need-to-know (i.e., access is an
operational necessity) documented in the request.

The IT System security features have the capability to restrict the user’s
access to only information and/or functions appropriate for the authorized
activities.

The office ISO or designee reviews all approved requests.

Requests for access to remote systems and networks not under the Agency facility
management control (i.e., Automation Center) must be routed through the ISO prior
to approval.

Access requirements to information systems by auditors, consultants, representatives
of hardware and software vendors, communication company employees, volunteers,
work-study students, and other members of the general public must meet or exceed
those requirements established for the Agency employees.

Procedures will be established at the Agency facilities that require all users to sign an
“Access Notice” (electronic or paper copy) before actual computer access is granted.

The rules of behavior cited in OMB Circular A-130, Appendix III clearly delineate
responsibilities and expected behavior of all individuals with access to the system.
The rules:

State the consequences of inconsistent behavior or noncompliance.

Should be in writing and form the basis for security awareness and training.

Will be available to every user prior to receiving authorization for access to
the system.

Will be incorporated into the “access notice” for each system.

Each Agency facility will establish procedures for identifying, managing (adding and
deleting users), recording, and monitoring who has access to sensitive IT System
resources.

The process of distribution of access codes will be controlled by the ISO and may be
delegated to a designee.

If access codes cannot be issued directly to users, a secure method for delivery will
be established.
1.3.2.2.
Audit and Management Reviews.

The Agency offices ensure that user access and privileges are reviewed at least every
90 days for appropriate level of access/continued need.

Reviews examine the levels of access of each individual, conformity with the
concept of least privilege, whether all accounts are still active, whether management
authorizations are up to date, and whether required training has been completed.
1.3.2.3.
Temporary Assignments, In-house Transfers, and Terminations.
6
Operational Controls
IT Security Handbook

Access authorizations are typically changed under two types of circumstances: (1)
change in job role, either temporarily (e.g., while covering for an employee on sick
leave or training a new employee) or permanently (e.g., in-house transfer) and (2)
termination.

Although necessary, temporary access authorizations should be granted sparingly and
monitored carefully, consistent with the need to maintain separation of duties for
internal control purposes. The access must be removed promptly when no longer
required.

Permanent changes are necessary when employees change positions within an
organization. In this case, the process of granting account authorizations described
earlier will occur again. The Agency offices must establish a procedure to ensure
that access authorizations of the prior position be removed.

Terminations of a user’s system access generally can be characterized as either
“friendly” or “unfriendly.” Security issues must be addressed in both situations.

Friendly termination can occur when an employee is voluntarily transferred,
resigns, or retires. Security issues must be addressed in all situations. Local
“friendly” termination procedures will include:
a. Removal of access privileges to all IT System resource accounts
b. Control of keys
c. Briefing on the continuing responsibilities for confidentiality and
privacy
d. Return of property
e. Continued availability of data. In both the manual and the
electronic worlds, this may involve documenting procedures or
filing schemes, such as how documents are stored on the hard
disk, and how are they backed up. Employees should be
instructed whether or not to transfer important data from their PC
to appropriate personnel before leaving. If cryptography is used
to protect data, the availability of cryptographic keys to
management personnel must be ensured.

Unfriendly termination may include situations when the user is being
removed from duty, “RIFed”, or involuntarily transferred and there is a
reasonable belief that IT System resources could be abused or misused.
Local “unfriendly” termination procedures will include:
a. Termination of system access at the same time (or just before)
the employees are notified of their dismissal or upon receipt of
resignation.
b. When an employee notifies an organization of a resignation and
it can be reasonably expected that it is on unfriendly terms,
system access should be immediately terminated.
c. If applicable, during the “notice of termination” period assign the
individual to a restricted area and function. This may be
particularly true for employees capable of changing programs or
modifying the system or applications.
7
Operational Controls
IT Security Handbook
d. In some cases, physical removal from the offices may be
necessary.
1.4. RESPONSIBILITIES
1.4.1.
The Agency CIO ensures that facilities within the network are in compliance with
personnel security procedures as described in this chapter.
1.4.2.
Office Heads, and Regional Facility Directors: ensure that ALL positions are assigned a
proper sensitivity level designation based on information security criteria, such as computer
related responsibilities, type of data to which the individual has access, a reasonable analysis
of the risk, and principles of responsible management.
1.4.3.
Senior Management/Human Resources analyze all positions, establish their sensitivity
level designation, and document designation with a Position Sensitivity Level Designation.
The Office Head, or designee (e.g., Director, Human Resources) will sign the appropriate
form.
1.4.4.
Human Resources:
1.4.5.
1.4.6.
1.4.7.

Ensure that documentation for background investigations for identified positions are
maintained in each employee’s personnel file.

Notify ISO of all terminations and transfer of in-house employees.
Supervisor or designee(s):

Annually review the position description and performance standards with each
employee occupying a position designated as sensitive.

Discuss specific information security responsibilities with the employee.

Discuss with the employee the consequences of noncompliance with those security
responsibilities for the employee’s particular position.

Monitor temporary access authorizations and notify ISO when access should be
terminated.
The Information Security Officer(ISO)/Alternate ISO:

Ensure access control procedures are in place for temporary access, permanent
changes, and termination (friendly and unfriendly) of users. This will be confirmed
by regular review and audit.

Ensure that “rules of behavior” have been established for all IT Systems.

Ensure that “access notices/rules of behavior” have been reviewed and signed by all
users prior to being granted access to the facility’s IT Systems.

Maintain “access notices/rules of behavior” for all individuals accessing the IT
System resources.

Maintain a list of all individuals granted system access, including remote access.

Ensure that all positions have an established sensitivity level designation.
Designee(s) must distribute appropriate application menus and access privileges.
8
Operational Controls
IT Security Handbook
2. INCIDENT REPORTING
2.1. PURPOSE AND SCOPE
2.1.1.
This chapter establishes mandatory procedures for IT Systems' security incident reporting
within the Agency. It is designed to provide the Agency personnel the procedures for the
proper response to an efficient and timely reporting of computer security related incidents,
(e.g. major computer viruses, unauthorized user activity, and suspected compromise of the
Agency data). These procedures are intended to meet required mandates of the Agency and
to assist in the protection of the Agency IT System resources from unauthorized access,
disclosure, modification, destruction, or misuse.
2.1.2.
An IT System security incident reporting system is necessary to identify a violation or
incident, assess damage as a consequence of a violation, record the violation or incident,
investigate and report the incident, and use information to prevent future occurrences or
violations. The reporting process outlined in these procedures is intended to detect and
respond to IT System security incidents as they occur, assist in preventing future incidents
through awareness, and when combined with existing IT System security procedures,
augment the Agency IT System security controls.
2.1.3.
The policy contained in this chapter covers all the Agency IT System resources whether
maintained in-house or in the interest of the Agency. These policies are mandatory on all
organizational units, employees, contractors, and others having access to and/or using the IT
System resources of the Agency
2.2. BACKGROUND
2.2.1.
Incident Response is a requirement of the Office of Management and Budget (OMB)
Circular A-130, “Management of Federal Information Resources,” Appendix III.
Responding to computer security incidents is generally not a simple matter. This activity
requires technical knowledge, communication and coordination among staff responding to
the incident, and adherence to applicable the Agency policy. Incidents over the last few
years indicate that, if anything, responding to incidents is increasingly more complex.
Intrusions into machines are a serious concern, and increasing sophistication and
collaboration among network attackers pose a considerable threat to the integrity of
computing resources. Viruses will continue to occasionally infect the Agency computers,
despite widespread availability of virus detection and eradication software.
2.3. POLICY/PROCESS
2.3.1.
Security Incident Standards
2.3.1.1.
An incident refers to a computer security problem arising from a threat. Computer
security incidents can range from a single virus occurrence to an intruder attacking
many networked systems, or such things as unauthorized access to sensitive data and
loss of mission-critical data.
2.3.1.2.
IT System security incidents to be reported and tracked can be categorized as follows
(these types of acts are not all-inclusive):

Circumvention of IT System security controls, safeguards and/or procedures
9
Operational Controls
IT Security Handbook

Unauthorized access, use, disclosure, alteration, manipulation, destruction, or other
misuse of data and AIS

Theft, fraud, or other criminal activity committed with the aide of IT System
resources

Theft, loss or vandalism of IT System hardware, software or firmware

Issues affecting confidentiality, integrity and availability of data

Unauthorized downloading or copying of sensitive Agency information
2.3.1.3.
2.3.2.
Examples of specific reportable incidents which are to be reported under the six
categories of incidents include (but are not limited to):

Unauthorized access to or use of sensitive data for illegal purposes

Unauthorized altering of data, programs, and IT System hardware

Loss of mission-critical data

Environmental damage/disaster (greater than $10,000) causing loss of IT System
services or data, or which may be less than $10,000 in damage yet have affected the
Administration’s or staff office’s capabilities to continue day-to-day functions and
operations

Major infection of sensitive systems or software by malicious code, i.e. virus, Trojan
Horse, etc

IT System perpetrated theft, fraud and other criminal computer activity;

Telecommunications/network security violations, i.e., networks (including local area
networks (LANs) and wide area networks (WANs)) which experience service
interruptions that cause an impact to an indefinite number of end users

Theft or vandalism of IT System hardware, software or firmware whose loss did or
may affect the organization’s capabilities to continue day-to-day functions and
operations

Unauthorized access to data when in transmission over communications media (e.g.
sniffers)

Loss of system availability impacting the ability of users to perform the functions
required to carry out day-to-day responsibilities (e.g. denial of service attacks)

Unauthorized access to and/or unauthorized use of the Internet
Reporting Procedures
2.3.2.1.
The person observing or discovering the incidents, as defined above, advises their
supervisor or the office ISO as soon as possible. The office ISO is responsible for
recording and reporting security incidents. Additionally, those incidents which are
determined to affect a facility’s capability to accomplish critical functions, restrict the
availability of a system or communications medium, i.e. LAN, WAN, etc., or result in
a monetary impact to the facility, will be reported within 48 hours of the occurrence to
the Agency Information Security Officer. Depending on the severity and the nature of
the incident, the Agency ISO may also contact the Agency General Counsel, and the
Office of the Inspector General (OIG), and FedCIRC.
2.3.2.2.
Reportable IT System security incidents are recorded on a security incident form or
log as developed by the office. Essential information about the security incident will
10
Operational Controls
IT Security Handbook
be identified in as much detail as possible, at the time of occurrence. Some
information may need to be added at a later time based on the investigation/closure of
the incident. The following minimum information about a security violation or
incident will be entered on the IT System security violation/incident form:

Location of incident and organization filing report

Reported by (Name, Title and Organization)

Date and time of report filing

Date and time of incident

Details of incident (include names of personnel involved and description of the who,
what, when, where, how, and why)

The name and title of the person to whom the incident initially was reported

Identification of whether the Inspector General or appropriate law enforcement
organization has been notified

Incident impact on day-to-day operations

Action taken to contain the incident and resources required to correct the incident (in
cases of system outage note what vendors have been contacted)

Short-range corrective action, such as immediately removing a terminated
employee's access privileges

Long-range corrective actions, as necessary

Estimated monetary damage

Additional information, as appropriate
2.3.2.3.

Initial reports of serious incidents or violations may be reported by telephone.

Reports may be sent by U.S. mail using the double-envelope method, couriers, or
secured electronic mail or facsimile.

Follow-up contact will be established with the reporting unit or office by the ISO,
and tracking for each incident will be continued until final closure.

Each office or unit ISO will be responsible for making the determination of whether
the IT System security incident at their level is reportable based on the definitions
provided in this procedure and ensuring that reports are filed with the Agency ISO.
2.3.2.4.
2.3.3.
The information collected on the IT System security incident form is reported to the
Agency Information Security Officer (ISO) in a confidential manner.
Protection of Report Information. IT System security incident report information will
be treated as sensitive information and safeguarded as equivalent to Privacy Act
information. Access to IT System security incident information must be restricted and
stored in a secured area.
Tracking of IT System Security Incidents
2.3.3.1.
The ISSO is responsible for tracking IT System security violations and incidents for
the Agency. Tracking includes monitoring each incident through final closure and
maintaining a copy of the incident report for a period of three (3) years. The ISSO
reports those security violations and incidents which threaten critical organization
functions to the office of the e Agency Information Security Officer (ISO).
11
Operational Controls
IT Security Handbook
2.3.3.2.
Reporting of Security Incidents and Violations to the Media. The Agency offices
must refer questions from the media (e.g., newspapers, television, and radio)
concerning IT System security violations or incidents to the Agency Public Affairs
Office.
2.4. RESPONSIBILITIES
2.4.1.
2.4.2.
2.4.3.
Agency ISO:

Ensures that the Agency policy, procedures, and standards meet the Agency
requirements outlined in the Agency’s corresponding Handbook.

Provides guidance and assistance to the Agency offices in preparing their IT System
Security Incident Reporting policy, procedures, and standards to comply with the
Agency policy.

Provides assistance, upon request, and as needed, to the Agency offices in dealing
with both the administrative and technical aspects of reportable IT System security
incidents. The Agency Information Security Officer (ISO) is the initial point of
contact for each office.

Organize an incident response team, as needed, to assist sites with IT System security
incidents.

Report incidents that are determined to affect the Agency’s overall capability to
accomplish critical functions; restrict the availability of a system or communications
medium; or result in a monetary impact to the Agency’ s Information Resources
Security Officer (ISO).
The Office of the General Counsel:

Interprets laws, regulations, and directives applicable to the Agency IT System
security activities, and specific to IT System incident occurrences and reporting of
those occurrences.

Renders legal advice and other legal services with respect to IT System security
incidents.
The Office of the Inspector General:

Investigates and audits major IT System security incidents when appropriate, and
conducts criminal investigations, as warranted.

Provides advice on coordinating an investigative process for IT System security
incidents and reconciliation of those incidents.
2.4.4.
The Agency CIO. The Agency CIO ensures that the provisions of this chapter are
implemented at all facilities within the Agency.
2.4.5.
Office Heads, and Regional Facility Directors:

Implement the IT System security requirements at their office or facility.

Ensure that the office or unit ISO investigates, reviews, and records IT System
security incidents and notifies the Agency Information Security Officer when a
reportable incident, as defined above, occurs.
12
Operational Controls
IT Security Handbook
2.4.6.
2.4.7.
2.4.8.
The Information Security Officer(ISO)/Alternate ISO:

Establishes the office IT System security incident reporting system.

Logs, investigates, and reviews IT System security incidents and reports the incidents
to the appropriate the Agency Information Security Officer.

Establishes contact with the Agency incident response team when a reportable
incident occurs as defined earlier in this chapter.
Managers and Supervisors:

Implement the requirements of the unit's IT System security incident reporting
procedures within their assigned areas of management control.

Ensure that IT System security violations/incidents, occurring within their assigned
area of management control, are reported to the appropriate facility ISO.

Ensure on a regular basis that all assigned employees, contractors and other
individuals, who develop, operate, administer, maintain, or use the Agency IT
System resources understand they are responsible for reporting actual or suspected IT
System security incidents to their immediate supervisor or office ISO.
All the Agency Employees, contractors, and other individuals with access to sensitive
areas or IT Systems are responsible for reporting IT System security violations or incidents
to their supervisor and/or ISO.
13
Operational Controls
IT Security Handbook
3. EDUCATION, TRAINING AND AWARENESS
3.1. PURPOSE AND SCOPE
3.1.1.
This chapter provides policy and guidance for offices in establishing their security
awareness and training program. To protect the integrity, confidentiality, and availability of
information, the Agency offices will ensure that each person involved understands their
roles and responsibilities and is adequately trained to perform them.
3.1.2.
The procedures and responsibilities described in this handbook apply to all the Agency
organizational units, employees, contractors, and others having access to and/or using the IT
System resources of the Agency.
3.2. BACKGROUND
3.2.1.
The Computer Security Act of 1987 (Public Law 100-235) requires that “each agency must
provide for the mandatory periodic training in computer security awareness and accepted
computer practices of all employees who are involved with the management, use, or
operation of each Federal computer system within or under the supervision of that agency”.
3.2.2.
In accordance with the Computer Security Act of 1987, the National Institute of Standards
and Technology (NIST) working with the U.S. Office of Personnel Management (OPM) was
charged with developing and issuing guidelines for Federal computer security training. This
requirement was satisfied by NIST’s issuance of “Computer Security Training Guidelines”
(Special Publication 500-172).
3.2.3.
In January 1992, OPM issued a revision to the Federal personnel regulations making these
voluntary guidelines mandatory. This regulation, 5 CFR Part 930, is entitled “Employees
Responsible for the Management or Use of Federal Computer Systems” and requires Federal
agencies to provide IT System security training as set forth in NIST guidelines.
3.2.4.
In 1998, the Office of Management and Budget (OMB) Circular A-130, “Management of
Federal Information Resources,” Appendix III, “Security of Federal ITResources,” reenforced these mandatory training requirements and added additional requirements.
3.2.5.
Due to the revision of OMB Circular A-130, Appendix III, NIST issued a new publication in
April 1998, which superseded Special Publication 500-172. This new publication, NIST
Special Publication 800-16, “Information Security Training Requirements: A Role- and
Performance-Based Model” presents a new conceptual framework for providing IT System
security training. This publication is available on the Agency Information Security web site.
3.3. POLICY
3.3.1.
IT System Security awareness training is required for:

New employees within 60 days of hire

All users on an annual refresher basis

Whenever there is a significant change in the IT System security environment or
procedures

When an employee enters a new position that deals with sensitive information
14
Operational Controls
IT Security Handbook
3.3.2.
Initial User Awareness Training
3.3.2.1.
Each employee (the Agency employee, contractors, and all other individuals using IT
System resources) must attend or receive some form (e.g. computer based training
[CBT] or video) of initial IT System security awareness training prior to being granted
access to the Agency systems. The user must understand the basic purpose of the
Information Security Program and its implementation before IT System access is
granted. At a minimum, the users must understand the following IT System security
components:

IT System Security Policy

Confidentiality

Password Security; Logging Off; Multiple Sign-Ons

Appropriate IT System Security Behaviors

Identification of ISO

Malicious Software

Email hoaxes

Back-ups (where appropriate)

Internet Use

Software licensing

Email manners

Expectations of privacy

Incident reporting

Telecommunication Security

Network Overview

Remote sign-on

Physical security

Disposal of Sensitive Information

Repercussions of misuse of IT System resources
3.3.3.
Attendance at all security training will be documented for each employee and placed in the
employee’s personnel file.
3.3.4.
Continuing Training
3.3.4.1.
As part of an effective information security training program, the office or unit will
also provide an ongoing security awareness program for all users. Awareness
activities may include:

Distribution of IT System security pamphlets and flyers

Viewing of IT System security videos

Dissemination of security posters throughout the facility

Security articles in the site’s newsletters, daily bulletins, web pages, etc
15
Operational Controls
IT Security Handbook
3.3.4.2.
3.3.5.
Each user is required annually to review the station information security policy and/or
procedures
In addition to the initial orientation awareness training and ongoing security awareness
activities, the user (e.g., employee, trainee, contractor, volunteer, etc.) will receive
continuing training annually in additional aspects of information security as it relates to the
requirements of the duties of the individual. Depending upon an individual's responsibilities,
the following is a list of possible training subjects:

Laws and Regulations

IT System Security Program

System Environment

System Interconnection

Information Sharing

Sensitivity

Risk Management

Management Controls

Acquisition/Development/Installation/Implementation Controls

Operational Controls

Awareness, Training, and Education Controls

Technical Controls

Contingency Plans

Internet/Intranet
3.3.6.
The supervisor will assess the need for appropriate information security training as the
employee's position changes or is revised. Employees will be solicited for ideas on how to
improve information security in the facility. NOTE: Everyone should be encouraged to
view information security as a positive procedural tool ensuring the confidentiality,
integrity, and availability of the Agency IT System systems.
3.3.7.
The Agency’s standard for developing and conducting IT System security awareness and
training for the Agency employees is NIST’s Special Publication 800-16, “IT Security
Training Requirements: A Role- and Performance-Based Model”.
3.4. RESPONSIBILITIES
3.4.1.
The Agency CIO. Ensures that the provisions of this chapter are implemented at all
facilities within the Agency.
3.4.2.
Office Heads, and Regional Facility Directors:

Ensure that their office has an information security training program that is effective,
dynamically applicable, and documented.

Ensure that information security is presented in a positive, cost-effective way.
16
Operational Controls
IT Security Handbook
3.4.3.
3.4.4.
3.4.5.
3.4.6.

Participate in orientation and continuing education activities to emphasize support for
the information security program.

Ensure there is a method established office-wide to document IT System security
training in each employee’s personnel folder.
The Agency Information Security Officer (ISO):

Provides assistance and support to the ISOs within the Agency,

Reviews the site’s security awareness and training programs during scheduled
security audits.
Information Security Officer(ISO)/Alternate Information Security Officer(AISO):

Ensures that an information security orientation is presented during new employee
entry processing.

Maintains documentation of employee awareness and refresher training.

Ensures that additional specialized training is provided as required. This will be
accomplished by working with the supervisors, and with the assistance of the
respective ISO, and the Agency.

Monitors the Information Security Awareness Program and recommends policy and
procedure. Specific information security responsibilities will be documented in each
position description and consequences of noncompliance to information security
procedures will be implemented according to current Human Resources directives
concerning employee conduct.

Distributes nationally provided information security training to the facility staff as it
becomes available and works closely with supervisors to disseminate this
information.
Supervisors:

Ensure that employees who have functional responsibilities in information security
areas (e.g., ISO, NHT, and system administrators) are given the opportunity to attend
security training lectures, courses, conferences, etc.

Provide copies of the facility IT system security policy and rules of behavior to the
employee and discuss with the employee how they relate to the employee’s specific
position.

Assess the need for appropriate information security training of an employee as
assignments change or as a position is revised.
Agency employees and other users:

Attend security orientation training and any other specifically assigned IT System
security training, as required, to fulfill their role.

Annually review the information security policy and rules of behavior appropriate to
the use of the Agency IT.
17
Operational Controls
IT Security Handbook
4. SECURITY CONSIDERATIONS IN COMPUTER SUPPORT
OPERATIONS
4.1. PURPOSE
4.1.1.
This chapter provides guidance for computer support and operations. The primary goal of
computer support and operations is the continued and correct operation of a computer
system. The closely linked goals of computer security are the availability, confidentiality,
and integrity of systems.
4.1 BACKGROUND
4.1.2.
Computer support and operations refers to everything required to run a computer system to
include both system administration and tasks external to the system that support IT S
operation (e.g., maintaining documentation). The support and operation of any computer
system is critical to maintaining the security of a system. Support and operations are routine
activities that enable computer systems to function correctly. These include fixing software
or hardware problems, loading and maintaining software, and helping users resolve
problems.
4.1.3.
The failure to consider security as part of the support and operations of computer systems is,
for many facilities, their Achilles heel. Facilities often undermine their expensive security
measures because of poor documentation, old user accounts, conflicting software, or poor
control of maintenance accounts. Also, facilities’ policies and procedures often fail to
address many of these important issues.
4.1.4.
The important security considerations within some of the major categories of support and
operation are:

User support

Software support

Hardware support

Configuration management

Backups

Media Controls

Documentation

Maintenance
4.2. POLICY
4.2.1.
User Support

(User Support Services) provides facility user support. An important security
consideration for user support personnel is the ability to recognize which problems
are security related.

System support and operations staff must be able to identify security related
problems, respond appropriately, and inform appropriate individuals. A wide range
18
Operational Controls
IT Security Handbook
of possible security problems exists. Some will be internal to the Agency
applications, while others apply to off-the-shelf products. Additionally, problems
can be software or hardware based.

4.2.2.
Software Security and Support Elements
4.2.2.1.
Controlling what software is used on a system.

All executable software used on sensitive the Agency IT System resources must be
obtained through authorized channels.

Each system installation of the Agency-developed or off-the-shelf software must be
reviewed and approved for determination of need and system compatibility, prior to
installation. This includes software acquired by any other means (e.g., public domain
software, bulletin board services, personally owned software, Internet obtainable
freeware). See the Agency 802, Appropriate Use of the Agency Office Equipment,
and the Agency 815, New Desktop Software Requests.

Executable software authorized to run on an Agency IT System resource must be
identified in the system’s security plan.
4.2.2.2.
Ensuring that software has not been modified without proper authorization.

There must be no local modification of security software features.

Willful and intentional modification of the Agency software for illegal or disruptive
purposes or for personal gain is a crime. There will be no modifications of these
programs except through authorized channels.

Safeguards must be in place to detect and minimize inadvertent or malicious
modification or destruction, or attempts to do so, of the Agency’s IT System
application software, operating system software, and critical data files. The
safeguards will achieve the integrity objectives and be documented in the system’s
security plan. The level of protection will be commensurate with the sensitivity of
the information processed.

All approved software, regardless of source, will be scanned for viruses prior to use.
Virus and malicious code (software) prevention and control measures will be
employed on every the Agency IT System resource to protect the integrity of the
software and data.
4.2.2.3.
4.2.3.
User support must be closely linked to the organization’s incident handling
capability. In many cases, the same personnel perform these functions.
Ensuring that software is properly licensed.

Use of copyrighted software will comply with copyright laws and license
agreements. See the Agency 802, Appropriate Use of the Agency Office Equipment,
and the Agency 815, New Desktop Software Requests.

The Agency licensed software may not be taken home without management
approval.
Hardware Security and Support Elements
4.2.3.1.
Hardware support will be under the direction of User Support(or its equivalent) or a
Help Desk.
19
Operational Controls
IT Security Handbook
4.2.3.2.
Security measures must be taken by all users to protect against theft and unauthorized
use of IT System peripheral and communications devices, microcomputers, and
related items such as printers, disks, and software.
4.2.3.3.
The removal of peripheral or communication devices from a facility for use off-site
must be controlled. Appropriate documentation will be maintained of all IT System
equipment and software removed from the facility, including the individual
responsible for the equipment and the date(s) the equipment was removed and
returned to the facility. NOTE: Remote off-site (e.g., dial-in) access to a computer
system must be authorized
4.2.3.4.
All physical security requirements (e.g., key and combination lock hardware, security
surveillance television equipment, room intrusion detectors), as identified in the risk
analysis, which may be deemed necessary by the facility ISO to protect peripheral
devices and microcomputers, will be compatible with and, when possible, integrated
into the facility’s security system.
4.2.3.5.
Locks and access control procedures will be used to protect storage media containing
sensitive data.
4.2.3.6.
For those systems where virus protection is applicable, such protection must be
current and enabled.
4.2.4.
Configuration Management
4.2.4.1.
Facilities must practice configuration management. Configuration management:

Manages changes made to a system’s hardware, software, documentation, and tests
throughout the life of a system.

Identifies, documents, and verifies the functional and physical characteristics of an
IT System, recording its configuration, and controlling changes to the System and its
documentation.

Ensures that changes to the system do not unintentionally or unknowingly diminish
security.
4.2.4.2.
Configuration management will provide a complete audit trail of decisions and design
modifications.
4.2.4.3.
A Configuration management plan will include:

A baseline that includes the controls for changes to IT System resources, including
hardware, software, administrative requirements, documentation, and connectivity to
another IT System or LAN.

A current list of all components of the IT System (hardware, software, and their
documentation).

The configuration of the peripherals (printers, modems) and interconnections to other
IT Systems (shared printers, file servers) and LANs.

Listing of version releases of current software, information on batch files,
environmental settings such as paths, and switch settings of machine components.
4.2.4.4.
4.2.5.
All the Agency IT Systems will employ configuration management at a level
appropriate with the size, complexity, and sensitivity of the system.
Backups
20
Operational Controls
IT Security Handbook
4.2.5.1.
Backup of IT System resources must be done on a periodic basis.

Support and operations personnel backup major systems’ software and data.

Users of smaller systems are responsible for their own backups.

Facilities may task support personnel with making backups periodically for smaller
systems, either automatically (through server software) or manually.
4.2.5.2.
Backups are critical to contingency planning and all users must be provided adequate
awareness training on the importance of backing up data as well as the appropriate
method for backing up their data, if this function is their responsibility.
4.2.5.3.
Frequency of backups will depend upon how often data changes and how important
those changes are.
4.2.5.4.
Backup procedures must be periodically tested to ensure that copies work as intended..
4.2.5.5.
Backups will be stored securely.
4.2.6.
Media Controls. Media controls will be utilized to protect IT System resources. Media
controls include a variety of measures to provide physical and environmental protection and
accountability for tapes, disks, printouts, and other media. From a security perspective,
media controls will be designed to prevent the loss of confidentiality, integrity, or
availability of information, including data or software, when stored outside the system. This
can include storage of information before it is input to the system and after it is output. The
extent of media control depends upon many factors, including the type of data, the quantity
of media, and the nature of the user environment. Physical and environmental protection is
used to prevent unauthorized individuals from accessing the media. It also protects against
such factors as heat, cold, or harmful magnetic fields.
4.2.6.1.
Marking (physical labeling).

Use labels to identify media with special handling instructions, to locate needed
information, or to log media to support accountability. Identification is often by
colored labels on diskettes or tapes or banner pages on printouts.

If labeling is used for special handling instructions, users must be appropriately
trained. The marking of IT System input and output is generally the responsibility of
the user, not the system support staff. Typical markings for media could include
Privacy Act Information or Joe’s backup tape. In each case, the individuals handling
the media must know the applicable handling instructions. For example, Joe’s
backup tape should be easy to find in case something happens to Joe’s system. Also
marking backup diskettes can help prevent them from being accidentally overwritten.
4.2.6.2.
Logging. The logging of media will be used to support accountability. Logs can
include control numbers (or other tracking data), the times and dates of transfers,
names and signatures of individuals involved, and other relevant information.
Periodic spot checks or audits may be conducted to determine that no controlled items
have been lost and that all are in the custody of individuals named in control logs.
4.2.6.3.
Physical Access Protection. As media can be stolen, destroyed, replaced with a lookalike copy, or lost, physical access protection must be utilized by facilities to protect
their IT System resources. Physical access controls include locked doors, desks, file
cabinets, or safes.

If the media requires protection at all times, ensure the output data goes to a medium
in a secure location (e.g., printing to a printer in a locked room instead of a generalpurpose printer in a common area).
21
Operational Controls
IT Security Handbook

Physical protection of media must be extended to backup copies stored offsite.
Back-up copies will be accorded an equivalent level of protection to media
containing the same information stored onsite. (Equivalent protection does not mean
that the security measures need to be exactly the same. The controls at the off-site
location are quite likely to be different from the controls at the regular site.)
4.2.6.4.
Environmental Protection. Magnetic media, such as diskettes or magnetic tape, will
be provided environmental protection, since they are sensitive to temperature, liquids,
magnetism, smoke, and dust. Other media (e.g., paper and optical storage) will have
different sensitivities to environmental factors and should be protected accordingly.
4.2.6.5.
Transmittal. Media transferred within the facility and to outside elements must be
secured during transmittal. Possible methods include sealed and marked envelopes,
authorized messenger or courier, or U.S. certified or registered mail.
4.2.6.6.
Disposition. Ensure that information is not improperly disclosed when media is
disposed. This applies both to media that is external to a computer system (such as a
diskette) and to media inside a computer system, such as a hard disk. The process of
removing information from media is called sanitization. One of the following three
techniques must be used by facilities in disposing of their media:

Overwriting. Overwriting uses a program to write (1s, Os, or a combination) onto
the media. Common practice is to overwrite the media three times. Overwriting
should not be confused with merely deleting the pointer to a file (which typically
happens when a delete command is used). Overwriting requires that the media be in
working order.

Degaussing. Degaussing is a method to magnetically erase data from magnetic
media. Two types of degaussers exist: strong permanent magnets and electric
degaussers.

Destruction. Destruction is shredding or burning.
4.2.6.7.
Documentation. Documentation of all aspects of computer support and operations
must be maintained to ensure continuity and consistency. Formalizing operational
practices and procedures with sufficient detail helps to eliminate security lapses and
oversights, gives new personnel sufficiently detailed instructions, and provides a
quality assurance function to help ensure that operations will be performed correctly
and efficiently.

The security of a system must be documented. This includes many types of
documentation, such as security plans, contingency plans, risk analysis, and security
policies and procedures. Much of this information, particularly risk and threat
analyses, has to be protected against unauthorized disclosure. Security
documentation needs to be both current and accessible. Accessibility should take
special factors into account (such as the need to find the contingency plan during a
disaster).

Security documentation must be designed to fulfill the needs of the different types of
people who use it. Facilities should have locally developed policy and procedures.
Policy is outlined in Chapter 1 of the the Agency IT System Handbook –
Management Controls. Security procedure manuals are written to inform various
system users how to do their jobs securely. A security procedures manual for
systems operations and support staff will address a wide variety of technical and
operational concerns in considerable detail.
22
Operational Controls
IT Security Handbook
4.2.6.8.
Maintenance. System maintenance requires either physical or logical access to the
system. If someone who does not normally have access to the system performs
maintenance, then a security vulnerability is introduced.

Procedures must be developed to ensure that only authorized personnel perform
maintenance. IT System technical support and maintenance work performed at the
Agency facilities (on-site) must be supervised by or under the control of the Agency
personnel knowledgeable in appropriate IT System operations.

Automated (i.e., computer-connected) dial-up diagnostic maintenance of sensitive
the Agency systems via remote communications between vendors and the Agency IT
System resources is prohibited unless authorized by management in the system’s
accreditation. If authorized, authentication of the maintenance provider by the
system prior to access is required.

If a system has a maintenance account, it is critical to change factory-set passwords
or otherwise disable the accounts until they are needed.
4.3. RESPONSIBILITIES
4.3.1.
Agency CIO. Ensures that the provisions of this chapter are implemented at all facilities
within the Agency.
4.3.2.
Agency ISO. Ensures that the Agency policy, procedures, and handbooks reflect the
Agency, Federal and generally accepted principles and practices for security IT Systems.
4.3.3.
Office Heads, and Regional Facilities Directors. Ensure that adequate support and funding
are provided to support their IT System functions and are ultimately responsible for the
security for systems under their management control.
4.3.4.
Office, Library, and Regional CIOs. Implement adequate computer support to the unit's
systems and to the users.
4.3.5.
System Administrators. Ensure that the controls described above are maintained for their
assigned systems and are responsible for day-to-day operations.
4.3.6.
Information Security Officer (ISO)/Alternate Information Security Officer (AISO):
Assist the support and operations staff in performing their duties and responsibilities as
outlined in this chapter.
23
Operational Controls
IT Security Handbook
5. PHYSICAL/ENVIRONMENTAL SECURITY
5.1. PURPOSE AND SCOPE
5.1.1.
This chapter provides policy and guidance to implement minimum requirements that will
reduce the exposure of computer equipment to physical and environmental damage and
assist in achieving an optimum level of protection for the Agency IT Systems.
5.1.2.
The policy contained in this chapter covers all the Agency IT System resources maintained
in-house or in the interest of the Agency. These policies are mandatory and apply to all
organizational units, employees, contractors, and others having access to and/or using the IT
System resources of the Agency.
5.1.3.
This policy applies to all IT Systems currently in existence and any new automated
technology acquired after the effective date of this policy document.
5.2. BACKGROUND
5.2.1.
In the early days of computer technology, securing the system in a controlled environment
with very limited access protected the computers and the information they processed.
Although major changes in computer environments have occurred, physical security is still
vitally important. Physical security measures are a tangible defense that must be taken to
protect the facility, equipment, and information from theft, tampering, careless misuse, and
natural disasters.
5.3. POLICY
5.3.1.
Staff and equipment require a safe, secure, and technically sound physical environment.
While it is necessary to comply with each of the areas addressed, appropriate adjustments or
allowances may be made for the organization, physical plant, and any special requirements
of the individual office or facility. Deviation from the minimum requirements must be
annotated on the system risk assessment and the Office Head or Facility Director must be
aware and acknowledge this deviation in the accreditation of the system.
5.3.2.
There must be, at a minimum, a cipher lock or suitable substitute on each door to the
computer room.
5.3.3.
Only personnel who require access to perform their official duties will be permitted in the
computer room.
5.3.4.
A log will be kept of all personnel who were issued the combination/key to the computer
room and the person will be required to sign for that combination/key.
5.3.5.
The combination of a cipher lock will be changed frequently, especially when a person who
was previously given the combination leaves the organization.
5.3.6.
Keys or card keys will be returned to the Agency upon separation, transfer, or termination.
5.3.7.
Loss of keys or disclosure of cipher key code will be reported to the ISO immediately.
5.3.8.
A computer room access roster will be established.
24
Operational Controls
IT Security Handbook
5.3.9.
There will be signs posted designating the room as a “Restricted Area”.
5.3.10. Contract maintenance personnel, and others not authorized unrestricted access but who are
required to be in the controlled area, will be escorted by an authorized person at all times
when they are within the controlled area.
5.3.11. All access to the computer room will be logged, and logs reviewed monthly by the ISO to
determine if access is still required.
5.3.12. There shall be no signs to indicate that an information system is located in any particular
building or area.
5.3.13. The main computer room should have certain structural physical security features. The
computer room:

Should be located in the center of the building

Should not have windows

The computer room walls should extend from true floor to true ceiling

Failure to meet these requirements must be annotated in the risk assessment
5.3.14. Media used to record and store sensitive software or data will be labeled, protected,
controlled and secured when not in use.
5.3.15. Physical access controls will also be implemented not only in the area containing system
hardware, but also locations of wiring used to connect elements of the system, supporting
services (such as electric power), backup media, communications closets, and any other
elements required for the system’s operation.
5.3.16. It is important to review the effectiveness of physical access controls in each area, both
during normal business hours and at other times – particularly when an area may be
unoccupied.
5.3.17. A computer room will have appropriate environmental security controls implemented, which
include measures implemented to mitigate damage to IT System resources caused by fire,
electrical surges and outages, water, and climate control failure.
5.3.17.1. Fire and Smoke

Install smoke detectors near computer equipment – and check them periodically.

Keep fire extinguishers in and near your computer rooms, and be sure all those with
authorized access know where they are and how to use them.

Enforce no smoking, no eating, and no drinking policies.

Periodically hold fire drills.
5.3.17.2. Climate

Keep all rooms containing computers at reasonable temperatures, following
manufacturers recommendations.

Keep the humidity level at 20-30 percent.
25
Operational Controls
IT Security Handbook

Install gauges and alarms that warn you if the environmental controls are getting out
of range. These alarms will be monitored at all times.

Equip all heating and cooling systems with air filters to protect against dust and other
particulate matter.
5.3.17.3. Water

Protect your systems from the various types of water damage. Flooding can result
from rain or ice buildup outside, toilet or sink overflow inside, or water from
sprinklers used to fight a fire. Maintain plastic sheeting to protect the equipment if
the sprinklers go off.

Avoid locating computer rooms in the basement.
5.3.17.4. Electricity

Connect all IT System resources to a non-interruptible power supply (UPS) that is
tested periodically.

Connect all critical IT System equipment to backup emergency generators.

Install anti-static carpeting in each facility.

Install a line filter on your computer’s power supply. A voltage spike can destroy
your computer’s power supply.
5.4. RESPONSIBILITIES
5.4.1.
Agency ISO Ensures that the Agency policy, procedures, and handbooks reflect the Agency,
Federal, and generally accepted principles and practices for the security of IT Systems.
5.4.2.
Agency CIO Ensures that the provisions of this chapter are implemented at all facilities
within the Agency.
5.4.3.
Office Heads, and Facility Directors

Ensure procedures are established for identifying and reporting suspected or actual
breaches of physical security.

Ensure that adequate funding is available for IT System physical and environmental
controls for elements under their administrative control.

User Support. Helps to develop, in cooperation with the ISO, physical access
control procedures for the computer room and other restricted areas. Trains staff on
the procedures established.

System Administrators. Comply with access control procedures established for the
computer room.

ISO/AISO. Monitors access to the computer room and ensures that the physical
access control procedures are established and followed.
26
Operational Controls
IT Security Handbook
6. CONTRACTOR/VENDOR/PARTNER SECURITY
6.1 PURPOSE
6.1.1. This chapter provides policy and guidance on implementing minimum security
requirements for conducting the Agency business utilizing contracts, sharing
agreements, and memorandums of understanding (MOUs) with companies, vendors,
and other federal agencies.
6.1.2. The policy contained in this chapter covers all the Agency IT System resources
maintained in-house or in the interest of the Agency. These policies are mandatory on
all organizational units, employees, contractors, and others having access to and/or
using the IT System resources of the Agency.
6.1.3. This policy applies to all IT Systems currently in existence and any new automated
technology acquired after the effective date of this policy document.
6.1. BACKGROUND
6.1.1.
The Agency is increasing the use of contractors and their services as well as entering into
inter-agency agreements. This chapter covers in further detail some of the security
requirements and controls that need to be addressed to ensure the confidentiality, integrity,
and availability of the Agency’s sensitive data and resources.
6.2. POLICY
6.2.1.
Contractor Personnel Security
6.2.1.1.
Security requirements and specifications for hardware and software maintenance
personnel contracted from commercial sources must be defined and approved prior to
signing of contractual agreements.
6.2.1.2.
Such requirements will vary depending upon the level of trust associated with the
equipment or system to be maintained.
6.2.1.3.
Maintenance contractors and their employees will be granted limited and controlled
access to computer equipment and systems consistent with established security
requirements. The access provided must be the MOST restrictive set of capabilities
and privileges required to perform the work.
6.2.1.4.
Access of contractors to the Agency’s sensitive systems must be in the interest of the
Agency.
6.2.1.5.
Access must be limited to a specified timeframe appropriate to the task and then
reviewed for possible termination.
6.2.1.6.
The Agency management or their designees must officially sponsor all non-the
Agency personnel accessing the Agency resources.
6.2.1.7.
All contractors that have access to the Agency’s sensitive systems and data must be
required to meet the minimum the Agency security requirements outlined in Chapter
1. “ Personnel Security”.
6.2.1.8.
Contractors must receive the same security training required for the Agency
employees, including orientation and periodic security updates.
27
Operational Controls
IT Security Handbook
6.2.1.9.
Contractors must indicate in writing that they have read and understand the Agency
security requirements applicable to them.
6.2.1.10. Contract personnel who access the Agency IT System resources or data must have a
background investigation. For questions concerning approval of contractor
investigations, contact the Agency Security Office.
6.2.1.11. The following language is recommended for inclusion in contracts concerning
background investigations:
“The investigative history for contract personnel working under this contract must
be maintained in the databases of either the Office of Personnel Management (OPM)
or the Defense Industrial Security Clearance Organization (DISCO). Should the
contractor use a vendor other than those identified by OPM or Defense Security
Service (DSS) to conduct investigations, the investigative company must be
certified by OPM/DSS to conduct contractor investigations.
All costs associated with obtaining clearances for contractor provided personnel are
the responsibility of the contractor. Further, the contractor will be responsible for
the actions of all individuals they employ to work for the Agency under this
contract. In the event that damages arise from work performed by contractor
provided personnel, under the auspices of this contract, the contractor will be
responsible for all resources necessary to remedy the incident.”
Contract personnel performing work under this contract shall satisfy all
requirements for appropriate security eligibility in dealing with access to sensitive
information and information systems belonging to or being used on behalf of the
Agency. To satisfy the requirements of the Agency, a Minimum Background
Investigation shall be conducted prior to performing work under this contract. The
level of access and the individual's capability to perform work under this contract
will be the determining factor in deciding if a higher investigative requirement is
needed. The contractor shall ensure that those requirements are fully satisfied
within 30 days of initiation of such investigations."
6.2.2.
Contracts/Sharing Agreements/Memorandum Of Understanding (MOU)
6.2.2.1.
All management, operational and technical security requirements outlined in the
Agency’s IT System Security Handbooks shall be included in contract specifications,
as applicable, for the acquisition, maintenance, or operation of the Agency IT System
resources.
6.2.2.2.
All requirements outlined in OMB Circular A-130, Appendix III, will be
implemented.
6.2.2.3.
Contracts, sharing agreements, and MOUs pertaining to IT System resources will be
reviewed by the ISO for security implications prior to initiation of the contract. A
separate section in the contract dealing with security issues will be incorporated,
where appropriate.
6.2.2.4.
If a potential risk to the Agency information resources exists, the ISO must be
contacted for advice and documentation of risk.
6.2.2.5.
Each the Agency office and facility must ensure that IT System
contracts/agreements/MOUs documents include a written requirement that they (e.g.,
contractor) meet the minimal security clearance levels as outlined in the Agency’s IT
Systems Security Operations Handbook, Chapter 1. “Personnel Security”.
28
Operational Controls
IT Security Handbook
6.2.2.6.
Contracts must stipulate that the contractor will be held responsible for the cost of
background investigations. Contractor personnel’s background information must be
maintained in the databases of either the Office of Personnel Management (OPM) or
the Defense Industrial Security Clearance Organization (DISCO). Should the
contractor use another vendor other than OPM or Defense Security Service (DSS) to
conduct investigations, the investigative company must be certified by OPM/DSS to
conduct contractor investigations.
6.2.2.7.
Access to the Agency’s network in the performance of contract duties and agreements
must be outlined in the statement of work and included in the contract. Inbound access
to the Agency’s network must be secure and meet all requirements as outlined in the
Agency’s IT System Technical Handbook, Chapter 3, “Network and Communication
Security”. Additional costs for implementing a secure connection must be included in
the contract, agreement, or MOU.
6.2.2.8.
Following are paragraphs of contracting language that may be added to contracts, as
required, to ensure that certain areas of security are addressed:
Records:
(Clause to be added if the contractor will have access to records protected by 38
U.S.C.
“Contractor personnel who obtain access to hardware or media which may manipulate
or store any sensitive information protected under 38 USC, as defined by the Agency,
must not access information unless absolutely necessary to perform their contractual
duties. Disclosure of any sensitive data obtained during the performance of the
particular contractual duty is prohibited. Violation of these statutory provisions may
involve imposition of criminal penalties.”
System of Records:
“The Agency system(s) of records to which the contractor personnel will have access
in order to maintain ________(system(s) to be deployed or maintained) is/are (insert
title and identity code of the Agency system(s) of records involved).
System Security:
“The Contractor shall provide the Agency with full assurance that security measures
have been implemented which are consistent with all the Agency, and other Federal
standards and guidelines.”
Procedures for User Access:
“Access requirements to the Agency information systems by contractors and
contractor personnel shall meet or exceed those requirements established for the
Agency employees as described in the Agency’s IT System Security Policy the IT
System Security Handbooks.”
6.3. RESPONSIBILITIES
6.3.1.
Agency ISO Ensures that the Agency policy, procedures, and handbooks reflect the Agency,
federal and generally accepted principles and practices for security IT Systems.
6.3.2.
Agency CIO. Ensures that the provisions of this chapter are implemented at all facilities
within the Agency.
29
Operational Controls
IT Security Handbook
6.3.3.
Office Heads, and Facility Directors. Ensure that adequate contractual controls are
implemented for all contracts, agreements, and procurements for which they hold
responsibility and are ultimately responsible for the information security for systems in the
area under their administrative control.
6.3.4.
CIO//ISO/AISO
6.3.4.1.
Ensures that all IT System security requirements (management, operational, and
technical) are reviewed and documented prior to negotiating a contract, agreement, or
MOU.
6.3.4.2.
Provides security requirements to the procurement official for inclusion into the
contract, agreement, or MOU.
6.3.5.
Procurement Official
6.3.5.1.
Ensures that the ISO reviews any contracts, agreements, MOUs pertaining to IT
System resources for adequate security specifications and requirements.
6.3.5.2.
Ensures the inclusion of a separate section in the contract dealing with information
security issues, where appropriate.
6.3.6.
Contractors
6.3.6.1.
Comply with all the Agency, and Federal security requirements.
6.3.6.2.
Protect access codes from improper disclosure.
6.3.6.3.
Access only authorized IT System applications and data necessary to perform
approved activities. Access capability does not equate to authority (e.g., casual
browsing of data is not permitted).
6.3.6.4.
Notify the Agency contact when access or authority is no longer required for approved
tasks.
6.3.6.5.
Attend IT System security training as required by the Agency policy, regulations,
MOUs, or sharing agreements.
6.3.6.6.
Fund and obtain background investigations as required.
30
Operational Controls
IT Security Handbook
7. APPENDIX A
7.1. ACRONYMS
AISO
Alternate Information Security Officer
CIO
Chief Information Officer
DISCO
Defense Industrial Security Clearance Organization
DSS
Defense Security Service
NHT
Information Technology Services Division
ISO
Information Security Officer
LAN
Local Area Network
MOU
Memorandum of Understanding
NIST
National Institute of Standards and Technology
OIG
Office of the Inspector General
OMB
Office of Management and Budget
OPM
Office of Personnel Management
ISO
Information Security Officer
WAN
Wide Area Network
31
Operational Controls
IT Security Handbook
8. APPENDIX B
8.1. GLOSSARY
Access Control
Security control designed to permit authorized access to an IT system
or application.
Accreditation
A formal declaration by the Office Head that the IT is approved to
operate in a particular security mode using a prescribed set of
safeguards. Accreditation is the official management authorization
for operation of IT and is based on the certification process, as well as
other management considerations. The accreditation statement
affixes security responsibility with the Office Head and shows that
due care has been taken for security.
Authentication
Verification of the identity of a user, user device, or other entity, or
the integrity of data stored, transmitted, or otherwise exposed to
unauthorized modification in an IT.
Audit Trail
A record showing who has accessed a computer system and what
operations he or she has performed during a given period of time.
Audit trails are useful both for maintaining security and for
recovering lost transactions.
Automated Information
System(s) (AIS)
An assembly of computer hardware, software and/or firmware
configured to collect, create, communicate, compute, disseminate,
process, store, and/or control data or information.
Availability of Data
The state when data are in the place needed by the user, at the time
the user needs them, and in the form needed by the user.
Backup
A copy of data and/or applications contained in the IT stored on
magnetic media outside of the IT to be used in the event IT data are
lost.
Certification
The comprehensive evaluation of the technical and non-technical
security features of an IT and other safeguards, made in support of
the accreditation process, that establishes the extent to which a
particular design and implementation meet a specified set of security
requirements.
Ciphertext
Form of cryptography in which the plaintext is made unintelligible to
anyone, who intercepts it by a transformation of the information
itself, based on some key.
Confidentiality
The concept of holding sensitive data in confidence limited to an
appropriate set of individuals or organizations.
Configuration
Management
The process of keeping track of changes to the system, if needed,
approving them.
32
Operational Controls
IT Security Handbook
Contingency Plan
A plan for emergency response, backup operations, and post-disaster
recovery maintained by an activity as a part of its security program
that will ensure the availability of critical resources and facilitate the
continuity of operations in an emergency situation.
COTS Software
Commercial Off The Shelf Software – software acquired by
government contract through a commercial vendor. This software is
a standard product, not developed by a vendor for a particular
government project.
Data Integrity
The state that exists when automated data is the same as that in
source documents, or has been correctly computed from source data,
and has not been exposed to alteration or destruction.
Degaussing Media
Method to magnetically erase data from magnetic tape.
Default
A value or setting that a device or program automatically selects if
you do not specify a substitute.
Dial-up
The service whereby a computer terminal can use the telephone to
initiate and effect communication with a computer.
Encryption
The process of making information indecipherable to protect it from
unauthorized viewing or use, especially during transmission or
storage. Encryption is based on an algorithm and at least one key.
Even if the algorithm is known, the information cannot be decrypted
without the key(s).
Facsimile
A document that has been sent, or is about to be sent, via a fax
machine.
Firewall
A system or combination of systems that enforces a boundary
between two or more networks.
Friendly Termination
The removal of an employee from the organization when there is no
reason to believe that the termination is other than mutually
acceptable.
Gateway
A bridge between two networks.
Hardware
Refers to objects that you can actually touch, like disks, disk drives,
display screens, keyboards, printers, boards, and chips.
Identification
The process that enables recognition of a user described to an IT.
Internet
A global network connecting millions of computers. As of 1999, the
Internet has more than 200 million users worldwide, and that number
is growing rapidly.
Intranet
A network based on TCP/IP protocols (an internet) belonging to an
organization, usually a corporation, accessible only by the
organization’s members, employees, or others with authorization. An
33
Operational Controls
IT Security Handbook
intranet’s Web sites look and act just like any other Web sites, but the
firewall surrounding an intranet fends off unauthorized access.
Intrusion Detection
Pertaining to techniques, which attempt to detect intrusion into a
computer or network by observation of actions, security logs, or audit
data. Detection of break-ins or attempts either manually or via
software expert systems that operate on logs or other information
available on the network.
ISO/AISO
The persons responsible to the Office Head or Facility Director for
ensuring that security is provided for and implemented throughout the
life cycle of an IT from the beginning of the concept development
plan through its design, development, operation, maintenance, and
secure disposal.
Issue-specific Policy
Policies developed to focus on areas of current relevance and concern
to an office or facility. Both new technologies and the appearance of
new threats often require the creation of issue-specific policies (e.g.,
e-mail, Internet usage).
IT Security
Measures and controls that protect an IT against denial of and
unauthorized (accidental or intentional) disclosure, modification, or
destruction of ITs and data. IT security includes consideration of all
hardware and/or software functions.
IT Security Policy
The set of laws, rules, and practices that regulate how an organization
manages, protects, and distributes sensitive information.
IT Systems
An assembly of computer hardware, software and/or firmware
configured to collect, create, communicate, compute, disseminate,
process, store, and/or control data or information.
LDAP
Short for Lightweight Directory Access Protocol, a set of protocols
for accessing information directories. LDAP is based on the standards
contained within the X.500 standard, but is significantly simpler.
And unlike X.500, LDAP supports TCP/IP, which is necessary for
any type of Internet access.
Least Privilege
The process of granting users only those accesses they need to
perform their official duties.
Local Area Network
A short-haul data communications systems that connects IT devices
in a building or group of buildings within a few square miles,
including (but not limited to) workstations, front end processors,
controllers, switches, and gateways.
Management Controls
Security methods that focus on the management of the computer
security system and the management of risk for a system.
Modem
An electronic device that allows a microcomputer or a computer
terminal to be connected to another computer via a telephone line.
34
Operational Controls
IT Security Handbook
Network
Two or more systems connected by a communications medium; a
network is composed of a communications medium and all
components attached to that medium whose responsibility is the
transference of information.
Operating System
The most important program that runs on a computer. Every generalpurpose computer must have an operating system to run other
programs. Operating systems perform basic tasks, such as
recognizing input from the keyboard, sending output to the display
screen, keeping track of files and directories on the disk, and
controlling peripheral devices such as disk drives and printers.
Operation Controls
Security methods that focus on mechanisms that primarily are
implemented and executed by people (as opposed to systems).
Overwriting media
Method for clearing data from magnetic media. Overwriting uses a
program to write (1s, Os, or a combination) onto the media.
Overwriting should not be confused with merely deleting the pointer
to a file (which typically happens when a “delete” command is used).
Password
Protected/private character string used to authenticate an identity or
to authorize access to data.
Parity
The quality of being either odd or even. The fact that all numbers
have parity is commonly used in data communication to ensure the
validity of data. This is called parity checking.
PBX
Short for private branch exchange, a private telephone network used
within an enterprise. Users of the PBX share a certain number of
outside lines for making telephone calls external to the PBX.
Peripheral Device
Any external device attached to a computer. Examples of peripherals
include printers, disk drives, display monitors, keyboards, and mice.
Port
An interface on a computer to which you can connect a device.
Port Protection Device
A device that authorizes access to the port itself, often based on a
separate authentication independent of the computer’s own access
control functions.
RADIUS
Short for Remote Authentication Dial-In User Service, an
authentication and accounting system used by many Internet Service
Providers (ISPs). When you dial in to the ISP you must enter your
username and password. This information is passed to a RADIUS
server, which checks that the information is correct, and then
authorizes access to the ISP system.
Real Time
Occurring immediately. Real time can refer to events simulated by a
computer at the same speed that they would occur in real life.
Remote Access
The hookup of a remote computing device via communication lines
such as ordinary phone lines or wide area networks to access network
35
Operational Controls
IT Security Handbook
applications and information
Risk
The probability that a particular threat will exploit a particular
vulnerability of the system.
Risk Analysis
The process of identifying security risks, determining their
magnitude, and identifying areas needing safeguards. Risk analysis is
a part of risk management.
Risk Management
Process of identifying, controlling, and eliminating or reducing risks
that may affect IT resources.
Router
An interconnection device that is similar to a bridge but serves
packets or frames containing certain protocols. Routers link LANs at
the network layer.
Rules of Behavior
Rules established and implemented concerning use of, security in,
and acceptable level of risk for the system. Rules will clearly
delineate responsibilities and expected behavior of all individuals
with access to the system. Rules should cover such matters as work
at home, dial-in access, connection to the Internet, use of copyrighted
works, unofficial use of Federal Government equipment, the
assignment and limitation of system privileges, and individual
accountability.
Security Incident
An adverse event in a computer system or the threat of such an event
occurring.
Security Plan
Document that details the security controls established and planned
for a particular system.
Security Specifications
A detailed description of the safeguards required to protect a system.
Sensitive Data
Any information, the loss, misuse, modification of, or unauthorized
access to, could affect the national interest or the conduct of Federal
programs, or the privacy to which individuals are entitled under
Section 552a of Title 5, U.S. Code, but has not been specifically
authorized under criteria established by an Executive order or an act
of Congress to be kept classified in the interest of national defense or
foreign policy.
Separation of Duties
A process that divides roles and responsibilities so that a single
individual cannot subvert a critical process.
Server
The control computer on a local area network that controls software
access to workstations, printers, and other parts of the network.
Smart Card
A credit-card-sized device with embedded microelectronics circuitry
for storing information about an individual. This is not a key or
token, as used in the remote access authentication process.
Software
Computer instructions or data. Anything that can be stored
36
Operational Controls
IT Security Handbook
electronically is software.
Software Copyright
The right of the copyright owner to prohibit copying and/or issue
permission for a customer to employ a particular computer program.
SPAM
To crash a program by overrunning a fixed-site buffer with
excessively large input data. Also, to cause a person or newsgroup to
be flooded with irrelevant or inappropriate messages.
System
Set of processes, communications, storage, and related resources that
are under the same direct management control, have the same
function or Mission objective, have essentially the same operating
characteristics and security needs, and reside in the same general
operating environment.
System Availability
The state that exists when required automated information s can be
performed within an acceptable time period even under adverse
circumstances.
System Integrity
The quality that a system has when it performs its intended function
in an unimpaired manner, free from deliberate or inadvertent
unauthorized manipulation of the system.
System Administrator
The individual responsible for defining the system’s operating
parameters, authorized functions, and security requirements. This
individual is usually the person who maintains the system on a dayto-day basis.
System Owner
The individual who is ultimately responsible for the function and
security of the system.
TCP/IP
Transmission Control Protocol/Internet Protocol. The Internet
Protocol is based on this suite of protocols.
Technical Controls
Security methods consisting of hardware and software controls used
to provide automated protection to the system or applications.
Technical controls operate within the technical system and
applications.
Technical Security
Policy
Specific protection conditions and/or protection philosophy that
express the boundaries and responsibilities of the IT product in
supporting the information protection policy control objectives and
countering expected threats.
Telecommunications
Any transmission, emission, or reception of signals, writing, images,
sound or other data by cable, telephone lines, radio, visual or any
electromagnetic system.
Threat
Any circumstance or event with the potential to cause harm to a
system in the form of destruction, disclosure, modification of data,
and/or denial thereof.
37
Operational Controls
IT Security Handbook
Trojan Horse
Any program designed to do things that the user of the program did
not intend to do, or that disguise its harmful intent. A program that
installs itself while the user is making an authorized entry; and, then
is used to break-in and exploits the system.
Unfriendly Termination
The removal of an employee under involuntary or adverse conditions.
This may include termination for cause, RIF, involuntary transfer,
resignation for “personality conflicts,” and situations with pending
grievances.
User
Any person who is granted access privileges to a given IT.
User Interface
The part of an application that the user works with. User interfaces
can be text-driven, such as DOS, or graphical, such as Windows.
Virus
A self-propagating Trojan horse (a program that surreptitiously
exploits the security/integrity of a program), composed of a mission
component, a trigger component, and a self-propagating component.
Vulnerability
A weakness in automated system security procedures, technical
controls, environmental controls, administrative controls, internal
controls, etc., that could be used as an entry point to gain
unauthorized access to information or disrupt critical processing.
Wide Area Network
A physical or logical network that provides capabilities for a number
of independent devices to communicate with each other over a
common transmission-interconnected topology in geographic areas
larger than those served by local area networks.
38
Operational Controls
IT Security Handbook
9. APPENDIX C
9.1. REFERENCES
Computer Security Act of 1987 (PL 100-235)
OMB Circular A-123, Internal Control Systems
OMB Circular A-130, Management of Federal Information Resources, Appendix III, “Security
of Federal IT Systems”.
Privacy Act of 1974 (PL-93-579) and Amendments
NIST SP 800-12, An Introduction to Computer Security; The NIST Handbook
NIST SP 800-14, Generally Accepted Principals and Practices for Securing IT Systems.
NIST SP 500-172, Computer Security Training Guidelines. This was replaced by 800-16.
Should it be here instead?
the Agency IT Systems Security Handbook
the Agency Directive XXX, IT Systems Security Policy
39
Download